Open in app

Sign In

Write

Sign In

Vicente Aceituno Canal
Vicente Aceituno Canal

898 Followers

Home

About

Published in The CISO Den

·Pinned

Questions a CISO should be able to answer

…or, ask himself/herself at the very least — “Wise is not the one who knows all the answers but the one who knows what questions to ask” More than an article, this is a conversation starter for the CISO and his/her team: What are your answers for this list of essential question that any information security department must…

Cybersecurity

3 min read

Questions a CISO should be able to answer
Questions a CISO should be able to answer
Cybersecurity

3 min read


Published in The CISO Den

·Pinned

Cybersecurity career mistakes

Being there, done that — I have personally made many mistakes during my career. Does that qualify me to give advice? I am not sure. Nevertheless, as a cautionary tale, I can list some mistakes that you potentially want to avoid if you can recognize them. Mistake 1: Going against the flow If you can identify themes and ride them, it…

Cybersecurity

3 min read

Cybersecurity career mistakes
Cybersecurity career mistakes
Cybersecurity

3 min read


Published in The CISO Den

·Pinned

Signs you are a fake Cybersecurity Expert

If you meet more than two of these :) — You throw around the names of famous actual experts often For example, mention how you met Troy Hunt, Bruce Schneier, Brian Krebs, Dan Kaminsky, etc. Also claim that their long exchanges online with anonymous commenters are, for real, yours Bonus: Mention someone who is not as well known like Ross Mayfield to make your audience feel that you know more…

Cybersecurity

3 min read

Signs you are a fake Cybersecurity Expert
Signs you are a fake Cybersecurity Expert
Cybersecurity

3 min read


Published in Assorted Thoughts

·22 hours ago

C++: Is It Really a Cruel Joke?

From “Robert G. Brown’s Home Page” — Neither Robert G. Brown’s in his Home Page, nor I, have an idea who wrote the following piece, but it is a brilliant satire of Stroustrup’s actual interview: 1st of January, 1998 — Bjarne Stroustrup interview in IEEE’s ‘Computer’ magazine Naturally, the editors thought he would be giving a retrospective view of seven years of object-oriented design, using the language he created.

Programming Languages

9 min read

C++: Is It Really a Cruel Joke?
C++: Is It Really a Cruel Joke?
Programming Languages

9 min read


Published in Assorted Thoughts

·Jan 16

Let’s face it — English is a crazy language

Author unknown to me — (I am not the author, collected from Internet, tried to ascertain authorship unsuccesfully) There is no egg in eggplant nor ham in hamburger; neither apple nor pine in pineapple. English muffins weren’t invented in England or French fries in France. Sweetmeats are candies while sweetbreads, which aren’t sweet, are meat. …

English Language

3 min read

Let’s face it — English is a crazy language
Let’s face it — English is a crazy language
English Language

3 min read


Published in The CISO Den

·Jan 13

Overcoming Censorship with a Modem?

Analog solutions may come to the rescue of the digital problems — Analog computers can fulfil complex tasks normally reserved this days for digital computers, and because of the way they operate they are far less sensitive to hacking attacks. If you have a critical operation, this old technology is way to go either as primary or seconday source of monitoring, control…

Cybersecurity

1 min read

Overcoming Censorship with a Modem?
Overcoming Censorship with a Modem?
Cybersecurity

1 min read


Published in The CISO Den

·Jan 3

CISO, this is how you can use the Toyota 5 Whys

It brings clarity! — The Toyota Five Whys is a problem-solving technique used to identify the root cause of a problem. The technique was developed by Toyota Motor Corporation to help identify and eliminate sources of defects and other problems that may arise in their production process. The technique involves repeatedly asking “why” in…

Cybersecurity

3 min read

CISO, this is how you can use the Toyota 5 Whys
CISO, this is how you can use the Toyota 5 Whys
Cybersecurity

3 min read


Published in The CISO Den

·Dec 27, 2022

How I Learned to Stop Worrying and Love the Risk Assessment

It turns out I was wrong all along — I have been a critic of risk assessment methods for a long time, against the prevalent thought among cybersecurity management professionals. It seems those who disagreed with me are right, and I was wrong. Let me explain: I was worried having too many methods, and an increasing number of them…

Cybersecurity

4 min read

How I Learned to Stop Worrying and Love the Risk Assessment
How I Learned to Stop Worrying and Love the Risk Assessment
Cybersecurity

4 min read


Published in The CISO Den

·Dec 13, 2022

The Daisy Access Control Model

Let your access control skills blosom — The work of administrators of many commercial applications is daunting. When you combine hundreds of user accounts, dozens of roles, hundreds of permissions and an unstoppable wave of changes including starters, leavers and periodic company reorganizations, the work just never ends. The Administrator in RBAC life RBAC is a long standing model that is proven…

Cybersecurity

4 min read

The Daisy Access Control Model
The Daisy Access Control Model
Cybersecurity

4 min read


Published in Assorted Thoughts

·Nov 22, 2022

What cryptocurrencies and blockchain are good for

It’s all about trust — We are in the middle of a crisis in the DeFi / Cryptocurrencies / Blockchain world. Valuation of crypto assets including NFTs are low, there is a string of scandals and hacks, and the real world applications still seem scarce. The crisis itself does not matter. The technology is here…

Blockchain

2 min read

What cryptocurrencies and blockchain are good for
What cryptocurrencies and blockchain are good for
Blockchain

2 min read

Vicente Aceituno Canal

Vicente Aceituno Canal

898 Followers

Evidence-based cybersecurity management leader

Following
  • Diana Meresc

    Diana Meresc

  • PropelAuth

    PropelAuth

  • Teri Radichel

    Teri Radichel

  • Nadin Brzezinski

    Nadin Brzezinski

  • Ali

    Ali

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech